Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.

LinuxSecurity.com
Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

As you may know, I like to rant about the poor state of computer security. I have reason to, because each year it appears we're losing the battle as more and more systems get exploited. We can't seem to take care of the simple stuff, like requiring better passwords or fixing DNS (who among you has enabled DNSSec?), much less the hard work it will take to make substantial improvements in the state of security.

Hector Xavier Monsegur, who by the US government's calculations participated in computer hacker attacks on more than 250 public and private entities at a cost of up to $50m in damages, was released from a Manhattan courtroom on Tuesday after the judge saluted his "extraordinary cooperation" with the FBI.

Glenn Greenwald, one of the reporters who chronicled the document dump by National Security Agency leaker Edward Snowden via the U.K. press, now said he's set to publish his most dramatic piece yet: The names of those in the United States targeted by the NSA.

Like a crowbar, security software tools can be used for good and evil.Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.

The Secure Boot security mechanism of the Unified Extensible Firmware Interface (UEFI) can be bypassed on around half of computers that have the feature enabled in order to install bootkits, according to a security researcher.

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?